General
-
Target
intelligence 12.20.doc
-
Size
80KB
-
Sample
201221-c1vx2ve4rn
-
MD5
2eac8507ab396c2e9476ae91a2bf92af
-
SHA1
fbbf0822676e29969047b1e0d0ba85704183445e
-
SHA256
e2a4320528f9332872848340b5d6a5cffadca8596567e245eb5a401c8ef918b6
-
SHA512
baa5d0d27031999ee4c8f4f8424807f2f9e1645a2ee455bfe31a559b9821ad519f942ada5225b54a459bdc6422837065ae88a41caa907a7865d8891624cdcbfe
Static task
static1
Behavioral task
behavioral1
Sample
intelligence 12.20.doc
Resource
win7v20201028
Behavioral task
behavioral2
Sample
intelligence 12.20.doc
Resource
win10v20201028
Malware Config
Targets
-
-
Target
intelligence 12.20.doc
-
Size
80KB
-
MD5
2eac8507ab396c2e9476ae91a2bf92af
-
SHA1
fbbf0822676e29969047b1e0d0ba85704183445e
-
SHA256
e2a4320528f9332872848340b5d6a5cffadca8596567e245eb5a401c8ef918b6
-
SHA512
baa5d0d27031999ee4c8f4f8424807f2f9e1645a2ee455bfe31a559b9821ad519f942ada5225b54a459bdc6422837065ae88a41caa907a7865d8891624cdcbfe
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Drops file in System32 directory
-